Method and apparatus for querying content protected by identity-based encryption
First Claim
1. A method comprising:
- receiving at a first user device a query from a second user device for encrypted data, the query being associated with a first user, the first user being described according to a first set of criteria;
based, at least in part, on the query and one or more second sets of criteria associated with a second user, determining by the first user device whether at least one of the second sets of criteria are matched, at least in part, to the first set of criteria; and
associating by the first user device the query with the matched at least one of the second sets of criteria used as a public key for encrypting the encrypted data according to an identity-based encryption scheme,wherein the first set of criteria and the at least one of the second sets of criteria include one or more digital right management compliant requirements.
3 Assignments
0 Petitions
Accused Products
Abstract
An approach is provided for reducing communication traffic/cost and protecting content by applying recipient criteria in identity-based encryption. A criterion application of a querier causes, at least in part, transmission of a query associated with a first user described according to a first set of criteria. Based on the query, the criterion application of the querier receives one or more second sets of criteria associated with respective second users, wherein the second sets of criteria are matched, at least in part, to the first set of criteria, and wherein at least one of the second sets of criteria is used as a public key for encrypting data according to an identity-based encryption scheme. A criterion application of an information store receives the query associated with the first user, and matches one or more second sets of criteria with all or part of the first set of criteria.
18 Citations
20 Claims
-
1. A method comprising:
-
receiving at a first user device a query from a second user device for encrypted data, the query being associated with a first user, the first user being described according to a first set of criteria; based, at least in part, on the query and one or more second sets of criteria associated with a second user, determining by the first user device whether at least one of the second sets of criteria are matched, at least in part, to the first set of criteria; and associating by the first user device the query with the matched at least one of the second sets of criteria used as a public key for encrypting the encrypted data according to an identity-based encryption scheme, wherein the first set of criteria and the at least one of the second sets of criteria include one or more digital right management compliant requirements. - View Dependent Claims (2, 3, 4, 5, 18, 19, 20)
-
-
6. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus embedded in a first user device to perform at least the following, receive a query from a second user device for encrypted data, the query being associated with a first user, the first user being described according to a first set of criteria; based, at least in part, on the query and one or more second sets of criteria associated with a second user, determine whether at least one of the second sets of criteria are matched, at least in part, to the first set of criteria; and set the matched at least one of the second sets of criteria as a public key for encrypting data, associated with the query, according to an identity-based encryption scheme, wherein the first set of criteria and the at least one of the second sets of criteria include one or more digital right management compliant requirements. - View Dependent Claims (7, 8)
-
-
9. A method comprising:
-
receiving at one or more second user devices a query sent from a first user device as made by a first user for encrypted data, the first user being described according to a first set of criteria; matching, by the one or more second user devices, one or more second sets of criteria with all or part of the first set of criteria, wherein the matching defines respective second users who are qualified to receive the query, and wherein at least one of the second sets of criteria is matched with all or part of the first set of criteria and was used by a respective second user as a public key for encrypting data to be shared with others, the encrypted data is associated with the respective second user and was encrypted according to an identity-based encryption scheme; and causing, at least in part, transmission of the at least one of the second sets of criteria to the first user device, wherein the first set of criteria and the at least one of the second sets of criteria include one or more digital right management compliant requirements. - View Dependent Claims (10, 11, 12, 13)
-
-
14. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus embedded in one of a plurality of second user devices to perform at least the following, receive a query sent from a first user device as made by a first user for data that is encrypted, the first user being described according to a first set of criteria; match one or more second sets of criteria with all or part of the first set of criteria, wherein the matching defines respective second users who are qualified to receive the query for data, and wherein at least one of the second sets of criteria is matched with all or part of the first set of criteria and was used by a respective second user as a public key for encrypting data to be shared with others, the encrypted data is associated with the respective second user and was encrypted according to an identity-based encryption scheme; and cause, at least in part, transmission of the at least one of the second sets of criteria to the first user device, wherein the first set of criteria and the at least one of the second sets of criteria include one or more digital right management compliant requirements. - View Dependent Claims (15, 16, 17)
-
Specification